Specifications include, but are not limited to: It is the District’s intent that the successful offeror will become the District’s primary contractor for the deployment of per device malware, ransomware, Phishing, and malicious software protection, detection, mitigation, and removal software to support all end points in the network. The software must employ the latest security detection technology (signatures, heuristics, zeroday, predictive, behavioral) in a user friendly method. In addition to the applicable software, any proposal solution needs to include the installation, configuration, tuning, maintenance, onsite technical support and training necessary to allow district users to fully utilize the software licensed on a turnkey basis.